Comparing version 1.5.4 to 1.5.5
@@ -0,1 +1,6 @@ | ||
## v1.5.5 (25 May 2019) | ||
* Fix resources error when cookie has % [#100](ttps://github.com/liriliri/eruda/issues/100) | ||
* Update dom plugin version | ||
## v1.5.4 (23 Sep 2018) | ||
@@ -2,0 +7,0 @@ |
{ | ||
"name": "eruda", | ||
"version": "1.5.4", | ||
"version": "1.5.5", | ||
"description": "Console for Mobile Browsers", | ||
@@ -5,0 +5,0 @@ "main": "eruda.js", |
<a href="https://eruda.liriliri.io/" target="_blank"> | ||
<img src="http://7xn2zy.com1.z0.glb.clouddn.com/github_eruda2.jpg"> | ||
<img src="./doc/banner.jpg"> | ||
</a> | ||
@@ -27,3 +27,3 @@ | ||
 | ||
 | ||
@@ -30,0 +30,0 @@ ## Why |
Sorry, the diff of this file is too big to display
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is too big to display
Sorry, the diff of this file is not supported yet
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 2 instances in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 1 instance in 1 package
AI-detected potential code anomaly
Supply chain riskAI has identified unusual behaviors that may pose a security risk.
Found 1 instance in 1 package
High entropy strings
Supply chain riskContains high entropy strings. This could be a sign of encrypted data, leaked secrets or obfuscated code.
Found 1 instance in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
2888701
23260
0
0